All Topics

Find Answers
Ask questions. Get answers. Find technical product solutions from passionate members of the Splunk community.

All Topics

Hi, i have a duration in seconds and want to convert it to days, hours and minutes. The additional seconds should be just cut off in the output. Ideally there should be no leading zeros (not "04 hour... See more...
Hi, i have a duration in seconds and want to convert it to days, hours and minutes. The additional seconds should be just cut off in the output. Ideally there should be no leading zeros (not "04 hours" but "4 hours") and if days, hours or minutes is 0 they should not be displayed in the output. Examples: Duration in seconds Output 14400 "4 hours" 14432 "4 hours" 604800 "7 days" 1800 "30 minutes" 108002 "1 day 6 hours"
Hi, We have been using EUM for our Portal site. It has been helpful to see any slowness issues from the user side.  We have some Users complaining about the slowness of our ERP Oracle system, but... See more...
Hi, We have been using EUM for our Portal site. It has been helpful to see any slowness issues from the user side.  We have some Users complaining about the slowness of our ERP Oracle system, but we can't see any slowness from the system side. My question is can EUM work on the ERP Oracle system,  AppDynamics is already monitoring ERP system app using Java agent.
Hi, I am working on a playbook which will check for any new artifact that has been added during the playbook execution. It must be repeatedly checking for any new artifacts. I am looking to add cus... See more...
Hi, I am working on a playbook which will check for any new artifact that has been added during the playbook execution. It must be repeatedly checking for any new artifacts. I am looking to add custom code that will be triggered by any addition of new artifacts.     Regards Sujoy
Evenid monitoring--> Need to get all  the event Id details to splunk used below stanza is and is not getting data n Please help  [WinEventLog://Setup] checkpointInterval = 5 current_only = 0 ... See more...
Evenid monitoring--> Need to get all  the event Id details to splunk used below stanza is and is not getting data n Please help  [WinEventLog://Setup] checkpointInterval = 5 current_only = 0 disabled = 0 whitelist1 = 1,2,3,4 index = sag_windows_normal ignoreOlderThan = 7d sourcetype = WinEventLog:Setup [WinEventLog://Application] checkpointInterval = 5 current_only = 0 disabled = 0 whitelist = * index = sag_windows_normal ignoreOlderThan = 7d sourcetype = WinEventLog:Application [WinEventLog://System] checkpointInterval = 5 current_only = 0 disabled = 0 whitelist1 = * index = sag_windows_normal ignoreOlderThan = 7d sourcetype = WinEventLog:System
Hi, I have SPL which includes just using bunch of lookups and producting following data: _time turnaround_time diff_time customer product_to product_from 2022-06-30 04:04:43.3... See more...
Hi, I have SPL which includes just using bunch of lookups and producting following data: _time turnaround_time diff_time customer product_to product_from 2022-06-30 04:04:43.399 2022-06-30 04:12:53.556 490.156810 nike cat dog 2022-07-07 05:15:14.209 2022-07-07 05:31:22.881  968.671302 adidas bear   cat I have got another lookup jira_data.csv which contains Jira data associated with it: Ticket customer Summary Status Created Resolved Updated COW-245 nike customer complaining open 2022-06-30 03:04:43.399 - 2022-06-30 03:21:43.399 COW-456 nike product change closed 2022-06-30 02:04:43.399  2022-06-30 07:04:43.399 2022-06-30 07:20:43.399   I am attempting to do follow: Use turnaround_time and lookup in the jira_data.csv and find all jiras if turnaround_time is around 2h back or front of Resolved.  In this example I am expecting COW-456 as an output.
Running a Windows 2012 R2 DHCP Server with UF 9.0.1 and Splunk Enterprise 8.0.5. My inputs at the UF look like this:   [default] index = windowsdhcp _TCP_ROUTING = prod [WinEventLog://System] st... See more...
Running a Windows 2012 R2 DHCP Server with UF 9.0.1 and Splunk Enterprise 8.0.5. My inputs at the UF look like this:   [default] index = windowsdhcp _TCP_ROUTING = prod [WinEventLog://System] start_from = oldest disabled = 0 current_only = 0 whitelist1 = SourceName="DhcpServer" whitelist2 = SourceName="Dhcp-Server" [WinEventLog://DHCPAdminEvents] start_from = oldest disabled = 0   My issue is that the whitelisted events in the 1st stanza are not getting processed to the indexer. If I review the XML of the events in the Windows Event Viewer: These events are collected and indexed:   - <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"> - <System> <Provider Name="Microsoft-Windows-DHCP-Server" Guid="{6D64F02C-A125-4DAC-9A01-F0555B41CA84}" /> <EventID>20251</EventID> <Version>0</Version> <Level>4</Level> <Task>121</Task> <Opcode>106</Opcode> <Keywords>0x2000000000000000</Keywords> <TimeCreated SystemTime="2022-10-29T12:25:40.655052000Z" /> <EventRecordID>161</EventRecordID> <Correlation /> <Execution ProcessID="3884" ThreadID="4472" /> <Channel>DhcpAdminEvents</Channel> <Computer>dhcp-srv-a.mydomain.com</Computer> <Security UserID="S-1-5-20" /> </System> - <EventData> <Data Name="Server">dhcp-srv-b.mydomain.com</Data> <Data Name="RelationName">dhcp-srv-b.mydomain.com-dhcp-srv-a.mydomain.com</Data> <Data Name="OldState">COMMUNICATION_INT</Data> <Data Name="NewState">NORMAL</Data> </EventData> </Event>   These events do not get captured (Note: event is in classic format):   Log Name: System Source: Microsoft-Windows-DHCP-Server Date: 14/11/2022 23:11:37 Event ID: 1376 Task Category: None Level: Warning Keywords: Classic User: N/A Computer: dhcp-srv-a.mydomain.com Description: IP address range of scope 10.119.6.0 is 89 percent full with only 6 IP addresses available. Event Xml: <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"> <System> <Provider Name="Microsoft-Windows-DHCP-Server" Guid="{6D64F02C-A125-4DAC-9A01-F0555B41CA84}" EventSourceName="DhcpServer" /> <EventID Qualifiers="0">1376</EventID> <Version>0</Version> <Level>3</Level> <Task>0</Task> <Opcode>0</Opcode> <Keywords>0x80000000000000</Keywords> <TimeCreated SystemTime="2022-11-14T23:11:37.000000000Z" /> <EventRecordID>87097</EventRecordID> <Correlation /> <Execution ProcessID="0" ThreadID="0" /> <Channel>System</Channel> <Computer>dhcp-srv-a.mydomain.com</Computer> <Security /> </System> <EventData> <Data>10.119.6.0</Data> <Data>89</Data> <Data>6</Data> </EventData> </Event>     I can't see why it is not collecting the second event via the 1st stanza?
Hello, For the past week I've been working in a way to run some queries for a report about vulnerability findings. I have made a lookup table for the vulnerability details and I call that to the ma... See more...
Hello, For the past week I've been working in a way to run some queries for a report about vulnerability findings. I have made a lookup table for the vulnerability details and I call that to the main query to do the work. However, I'm currently having a bit of trouble trying to figure out the scheduled query to run in order to update the vulnerabilities details lookup table. Since Rapid 7 sometimes doesn't import well their vulnerability definitions to splunk (i.e: there are 270000 lines but for some reason, some day only 12000 gets imported into splunk) I wanted to make some validations before deciding to run  the outputlookup to update the table. To do this I had deviced this so far:     index=rapid7 sourcetype="rapid7:insightvm:vulnerability_definition" | dedup id | lookup soc_vulnerabilities.csv vulnerability_id OUTPUT vulnerability_id title description | stats count as today | append [| inputlookup soc_vulnerabilities.csv | stats count as yesterday] | eval prov=yesterday | eval conditional=if(today>=yesterday,1,0) | table conditional, today, yesterday, prov     As you can see, all I'm doing is validating if the amount of lines being imported to splunk are the same or greater than the current amount of lines stored in the lookup table. Thing is, the eval with the conditional isnt working because both total values are being shown as if they were unrelated, which they kind of are. The result table is as follows: conditional today yesterday prov 0 238732     0   238732 238732 What I want is to compare both today and yesterday values in order to determine if the lookup table should or should not be updated. I've been looking at the documentation for a way to make it work and also checked some other posts here in the forums but I haven't found a similar case. I hope it's not because it is impossible, nevertheless, I'd appreciate if you guys could help me to figure this out or should I try to solve this problem from other perspective. Additional info: For those who have worked with this logs before, vulnerability_id field in that sourcetype doesn't exists, so we created it via CLI in the normalization options thing. Thanks in advance.
Hello, The other day our ITOC team received that alert [Splunk Monitoring] Check Failed: Gift Card Virtual - PROD - KB0012356 - [Step 0][Go To URL] net::ERR_NAME_NOT_RESOLVED I have checked KB001... See more...
Hello, The other day our ITOC team received that alert [Splunk Monitoring] Check Failed: Gift Card Virtual - PROD - KB0012356 - [Step 0][Go To URL] net::ERR_NAME_NOT_RESOLVED I have checked KB0012356 and it does not exist. Any chance I can get the info about how to troubleshoot this?   Thank you, Laura.
I am getting conflicting information, so I just wanted to ask. If you need to create a new field alias that would be in two sourcetypes, do you need to create two different field aliases or just one.
I am trying to correlate authentication attempts [ index_A (username, role) vs index_B (username, authentication_time) ] I want users returned from index_A who dont show up in index_B over last ce... See more...
I am trying to correlate authentication attempts [ index_A (username, role) vs index_B (username, authentication_time) ] I want users returned from index_A who dont show up in index_B over last certain number of days (ex. 14 days) To word it better, unique fields from index_A (which live in index_A) which can show up in index_B but I want to list the ones that dont show up  My current solutions is piping a search between the 2 indexes over a "username" field but that lists all the matching items and not unique items from index_A which are not in index_B 
I have a line chart panel in my dashboard that's comparing two series of datapoints, and I have "charting.legend.mode" set to "seriesCompare" to see the values next to the appropriate series name in ... See more...
I have a line chart panel in my dashboard that's comparing two series of datapoints, and I have "charting.legend.mode" set to "seriesCompare" to see the values next to the appropriate series name in the legend. Trouble is, the font color used for those values is very light and difficult to see.  Can an adjustment be made to change the font color of those compare values? I've circled the value in the screen capture below:    
is there a REST command to delete rows from the dmc_forwarder_assets.csv? For example, to remove rows where the status=missing or where hostname = a value provided in the REST command?     Than... See more...
is there a REST command to delete rows from the dmc_forwarder_assets.csv? For example, to remove rows where the status=missing or where hostname = a value provided in the REST command?     Thanks in advance.  
Hi Guys, So if I have two fields with really random set of text, no similarities except the red text.  Does have the 'red' fonts in similarity as below. In this case, is there a way to search to ... See more...
Hi Guys, So if I have two fields with really random set of text, no similarities except the red text.  Does have the 'red' fonts in similarity as below. In this case, is there a way to search to say when first four letters in FieldA exists in FieldB, exclude? This would be very easy in powershell or python.  I am medium splunk user as well, but not sure how I'd do this in splunk. This would be very helpful..  Your help is appreciated in advance.     FieldA FieldB Complete Exch.Complete NotComplete apps.NotC@ Satisftesting Satiapps
These two cells are examples of results I see in IIs logs.  If the field is just a / (backslash) ( as in the first example data cell ) I want to return just the /.  If there are characters after ... See more...
These two cells are examples of results I see in IIs logs.  If the field is just a / (backslash) ( as in the first example data cell ) I want to return just the /.  If there are characters after the first / (like search in #2) , I need to return the text between the backslashes.   / /search/20191108/master.svc   My results would look like this.  field1 root    search
Hi All, Windows event logs generate large volumes of data every day.  Thus, there is excessive data ingestion making data noisy and difficult to analyze.  I need your help to understand how to find... See more...
Hi All, Windows event logs generate large volumes of data every day.  Thus, there is excessive data ingestion making data noisy and difficult to analyze.  I need your help to understand how to find the events which can be filtered out to reduce the volume of ingested data without losing visibility of important events which help to track security issues.  Thank you
I have a dashboard which show results through the selected dropdown. The selected api will display only api_resposne which it has corresponding downstream_response as well. But the issue is the downs... See more...
I have a dashboard which show results through the selected dropdown. The selected api will display only api_resposne which it has corresponding downstream_response as well. But the issue is the downstream_response can only be searched with the trackid of api_response. is there a way to show the data of api_response corresponding with the results of downstream_response?
Our organization currently hosts a "Splunk Health" dashboard. This dashboard has a panel that shows the heartbeat interval and overdue status of all the known splunk forwarders. However, what this da... See more...
Our organization currently hosts a "Splunk Health" dashboard. This dashboard has a panel that shows the heartbeat interval and overdue status of all the known splunk forwarders. However, what this dashboard does not have is a panel that can identify any valid endpoint on network that does not have the splunk forwarder installed. Problem Statement: Add panel to dashboard that depicts any valid endpoint without Splunk forwarder installed. I am fairly new to splunk. However, I thought that the best way to tackle would be to pull a csv from AD of all valid endpoints (WS, Servers, etc) and host as a lookup table file within Splunk. Then identify a query that compare current "clients" in Forwarder Management against the new lookup table file (AD output). The results would show me any endpoint that is not currently a client within Forwarder Management. Any help would be appreciated. Thank you.
Hi, I have a panel on Dashboard Studio where no results are displayed on the panel and I am getting the message "Search ran successfully, but no results were returned".   When I in... See more...
Hi, I have a panel on Dashboard Studio where no results are displayed on the panel and I am getting the message "Search ran successfully, but no results were returned".   When I investigate this same search on the "Open in Search", the expected do get produced though. What can I do in this situation?   Thanks.
Hi, I have an xml response in the below format. I'm trying to read the BusinessId value of this. Since there are multiple, I want to read only the first one and use it as part of my report. ... See more...
Hi, I have an xml response in the below format. I'm trying to read the BusinessId value of this. Since there are multiple, I want to read only the first one and use it as part of my report. This is how my query looks: index=customer app_name="searchservice" | rex field=msg "BusinessId>(?P<BusinessId>[0-9]*)<\/" | table Client, MethodName, BusinessId,CorrelationId Fields Client, MethodName and CorrelationId have already been parsed out. The issue I'm seeing is that if the response xml has multiple entries of BusinessId, it doesn't show up in the result as shown in the first two correlation ids. For the next two, the xml had only one instance BusinessId, so it showed up in the response. How do I fix the regex to parse only the first instance and ignore the rest? Thanks, Arun
Hi guy, I am using Splunk UI to develop new app on the Splunk My app has components: Setup page: let people provide some configuration such as Splunk Token, Splunk HEC token, Proxy config A... See more...
Hi guy, I am using Splunk UI to develop new app on the Splunk My app has components: Setup page: let people provide some configuration such as Splunk Token, Splunk HEC token, Proxy config App component: Custom Rest endpoint (python)   From the app comment, I will make some calls to the custom rest endpoint to get / process data. On the setup page, I save all configurations into KV-store, to re-use So my question is: - How custom rest endpoint script (python file) can get information from KV-store, as you know, with python SDK, need a credential to authorize with Splunk. Have any way to connect Splunk from the custom rest endpoint script without authen? - Which place is better to save credentials or configurations in Splunk? kv sore? storage password or config file  - If does not any way to authen with Splunk from Custom rest endpoint without credentials, how can pass credentials to rest endpoint? Enter credential into config file? or attach credentials in the param request when we call the rest endpoint?   Thank! P/s: The first time I see a big platform have many version/options to develop, It make develop is confused ( Splunkjs, Splunk SDK, Splunk UI ...)